Feeds

Merced – those pictures

First the pictures and later the words

  • alert
  • submit to reddit

Beginner's guide to SSL certificates

Developer Forum - Updated See our original story Merced only slightly undead. We have also since published another story: Merced chieftain outlines chip futures, which is an interview with Stephen Smith, pictured below. And if you want to see a schematic of the Merced cartridge, go to Merced Solutions Overview Our full coverage of the Intel Developer Forum Feb 99 is here. The Merced package is 5 x 3. Pictured here is the connector side of the packaging. It has approximately 560 connections and can be hung from a motherboard and attached on top. To give an idea of scale, here are the hands of Stephen Smith, who runs the Merced programme and is holding a special Merced mug, next to a cup of coffee (his) and to a glass of red wine (ours) The heatsink side of the Merced packaging. You can see the clip mounts on the side but the shiny nature of the alloy didn't come out well in our photo. Merced held in a journalist's hand. This is the hand of Gordon Thorn, VNU's lab manager, whose life was saved later in the week by an Intel employee (see story). A shot of Stephen Smith, Merced's programme manager, in profile ®

Internet Security Threat Report 2014

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.